Research Article
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT
Algorithm 1
The stochastic game algorithm for the defenders and attackers (the optimal strategies for the defenders and attackers).
| Input: ; | | Output: optimal state trajectory and optimal strategies ; | (1) | Initialize game parameters , and ; | (2) | Set the rate parameters ; | (3) | For = 0 to ; | (4) | If the infected nodes 0 | (5) | Response the defense mechanism; | (6) | Calculate the optimal state trajectory in equation (4); | (7) | Calculate the optimal strategies in equation (21); | (8) | Analyze the influence of parameters on the optimal strategies; | (9) | Else | (10) | t = t + 1; | (11) | End if | (12) | Update and store it; | (13) | End for; | (14) | Return . |
|